I have created my RDS instance before creating my Elastic Beanstalk environment. The two are working together with no problem, but I'd like them to be linked together, and have the RDS parameters accessible via the RDS_*
environment variables.
The Elastic Beanstalk configuration page says:
Although the first link creates a RDS instance in-place and links it to the current environment, the second link just redirects to this documentation page., which unfortunately only explains how to create a new RDS instance, but not how to link an existing one.
How can I associate an existing RDS instance to my Elastic Beanstalk environment?
The "selected" answer is correct, but I wanted to add some extra information as most people using EB and RDS together should have the same requirement too - even if they don't know it yet.
First question: Why would you want the RDS instance to exist outside the EB environment? Answer: So that the lifetime of the RDS instance is not tied to the lifetime of the EB environment. i.e. when you remove an environment, you don't want to destroy the DB with it. There are very few reasons why you'd want to actually tie your RDS instance to your environment.
A problem with settings up RDS independently of EB is that you don't get the RDS_* variables automatically populated and therefore need to retrieve their values and populate them yourselves via web console or .ebextensions. It's not recommended that you add credentials to your code though, as that can be a security hole.
But then, the next problem is if you want to programmatically create environments (such as for blue-green zero downtime deployments) then you need a solution for how to populate the sensitive RDS values (e.g. password) every time. Unfortunately, this requires you to drop further down the AWS stack and use a CloudFormation template.
The ideal solution is an enhancement to EB so that the "use an existing database" link mentioned in the question actually lets you manually associate an existing RDS database and then have the RDS_* environment variables automatically populated again, rather than redirecting you to unhelpful documentation. AWS Support said this has been raised as a feature request but of course no timeframe given.
Answer from the AWS support:
I needed to this recently and also wanted to automate the steps using the AWS CLI/EB CLI. In any case, here are basically the steps I followed (assuming you already created an RDS instance):
aws ec2 create-security-group
(AWS CLI) for that and associate it with the RDS instance usingaws rds modify-db-instance
(AWS CLI).eb init
(EB CLI) for that).aws rds describe-db-instances
for that.RDS_*
environment variables on the EB instance when you create the environment (or deploy the environment later). You can do this witheb create
/eb deploy
(EB CLI). When you create the environment initially it will be degraded, since the security groups to access the RDS database are not set up properly.aws elasticbeanstalk describe-configuration-settings
(AWS CLI) for that.aws ec2 authorize-security-group-ingress
(AWS CLI) for that, which uses VPC security groups (not DB security groups). You can probably achieve the same with DB security groups if they are supported in your region. When setting up the inbound traffic rule make sure you use the right protocal and port for your database engine.aws rds modify-db-instance
(AWS CLI)).eb deploy
(EB CLI)). I had to do a redeploy, since I run migrations on deployments.That is mostly it. Now you should be able to scale up/down your RDS instances without care of the EB instances, as long you keep the hostname and DB credentials the same. You can also do blue/green deployments with that approach (but you might need to do some extra steps to also revoke security group access).
The easiest to add an existing security group to EB EC2 instances by configuration is to use the simple file described in https://github.com/awsdocs/elastic-beanstalk-samples/blob/master/configuration-files/aws-provided/security-configuration/securitygroup-addexisting.config
For example:
I was facing same issue and fixed using following steps :
1) Go to EC2 instance and note your security group example "sg-121212121212"
2) GO to RDS Security Group ad=nd inbound traffic
3) Edit rule select all traffic and add your new ebs security group "sg-121212121212"
Hope it will helpful
create RDS under Elastic; it will add new correct security group; modify security group of old existed RDS; set correct connection string at web config and all work...